There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.
{ "binaries": [ { "binary_name": "libapache-jena-java", "binary_version": "3.17.0-3" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-22665.json"
{ "binaries": [ { "binary_name": "libapache-jena-java", "binary_version": "4.9.0-1" } ] }